Solved

CD-Player

Posted on 1997-10-29
3
219 Views
Last Modified: 2012-05-04
Do you have any routines for playing sound from a mixed CD-ROM or Audio-CD while my programming is running ?
Please try, to give me some example sources.

Thanx, Roger Bieri
0
Comment
Question by:omsec
  • 2
3 Comments
 

Accepted Solution

by:
berox earned 100 total points
ID: 1216380
You should just send the play command to the CD driver.
DOn't know out of my head what the exact commands are , but if you could wait till' after the weekend I send you some example source ...
0
 
LVL 1

Expert Comment

by:FuzzyLogic
ID: 1216381
Berox - You should not lock question that you don't have the answer for it.

Omsec, You should send the "Play Audio" request. The request is sent that way:
  A. Make a table that look like this:
       00 Lenght of Table
       01 Subunit (=1)
       02 Command
       03 Status (2 bytes)
       05 nothing (8 bytes)
       0D Mode (=0)
       0E StartSector (4 bytes)
       12  NumberOfSectors (4 bytes)
     The numbers are the address in table (Hex).
     This table will be used to play, stop or resume audio.

  B. To play audio:
       Command=84h
       Lendth=14h
     To stop audio:
       Command=85h
       Length=0Dh
       (fields 0Dh-12h are not used).
     To resume audio:
       Command=88h
       Lenght=0Dh
       (fields 0Dh-12h are not used).

  C. Now call the interrupt:
      asm;
        MOV AX,1510h
        MOV CX,4             ; CDROM drive (E:=4)
        LES BX,PTable ; pointer to the table
        INT 2Fh
      end;

To get the starting sector of a track you should send a request to the CD device-driver, using interrupt 21 service 4402h

That was all the story.


0
 
LVL 1

Expert Comment

by:FuzzyLogic
ID: 1216382
I think those points are belong to me...
Berox - I don't think this is the way that "Experts-Exchange" should work.

Next time, if you don't have an answer to a question, DO NOT lock the question. If anyone will act like this, no one will answer the questions.

You can comment me at fuzzy_logic@usa.net
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Note: This is the third blog post in a series on email clearinghouses (https://www.xmatters.com/alert-management/blog-email-has-failed-us?utm_campaign=70138000000ydLoAAI&utm_source=exex&utm_medium=article&utm_content=blog-post).   We’ve been talki…
A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a security breach made him wonder if the endpoint a…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now